
USBs and betrayal: The small devices behind big data leaks They fit in your pocket. But they can sink an...

USBs and betrayal: The small devices behind big data leaks They fit in your pocket. But they can sink an...

It is not the file you send. It is what is hidden inside it. Every time you share a document,...

Think you can trace digital footprints, uncover hidden evidence, or spot cybercrime like a pro? Take this quick but revealing...

The war room is an interesting place – you get to see everything in action. The iShield360 cybersecurity center monitors...

It all starts with a compromise It always begins with a password. In June 2024, a procurement officer at a...

One Wednesday morning in August 2024, the Finance Director of a top-tier insurance company in the region clicked an email...

AI vs AI: Fighting Fraud with the Same Weapon Fraudsters Use Scene: Ntinda, Kampala. March 2025. A junior accountant receives...

On the sticky floor of a dimly lit bar in Kabalagala, Suspect 1 sealed the deal with a casual handshake....

The first thing Stella noticed was the silence. It wasn’t the usual kind, the quiet hum of people settling into...

Fraud is not an event. It’s a cultural failure. Fraud doesn’t begin in the finance department. It begins in silence....
we specialize in bridging the gap between knowledge and application.

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd